咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是201-210 订阅
排序:
Push-Based Content Dissemination and Machine Learning-Oriented Illusion Attack Detection in Vehicular Named Data Networking
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3131-3150页
作者: Arif Hussain Magsi Ghulam Muhammad Sajida Karim Saifullah Memon Zulfiqar Ali State Key Laboratory ofNetworking and Switching Technology Beijing University of Post and TelecommunicationBeijing100876China Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia School of Computer Science and Technology Harbin Institute of TechnologyHarbin150001China School of Computer Science and Electronic Engineering University of EssexColchesterCO43SQUK
Recent advancements in the Vehicular Ad-hoc Network(VANET)have tremendously addressed road-related ***,Named Data Networking(NDN)in VANET has emerged as a vital technology due to its outstanding ***,the NDN communicat... 详细信息
来源: 评论
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data acces
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 347-357页
作者: Jun Liu Kai Qian Zhibao Qin Mohammad Dahman Alshehri Qiong Li Yonghang Tai Yunnan Key Laboratory of Opto-electronic Information Technology Yunnan Normal UniversityKunming650500China Department of Thoracic Surgery Institute of The First People's Hospital of Yunnan ProvinceKunmingChina Faculty of Life and Biotechnology Kunming University of Science and TechnologyKunmingChina Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia
In recent years,statistics have indicated that the number of patients with malignant brain tumors has increased ***,most surgeons still perform surgical training using the traditional autopsy and prosthesis model,whic... 详细信息
来源: 评论
Building a Stereo and Wide-View Hybrid RGB/FIR Imaging system for Autonomous Vehicle
收藏 引用
IEEE Sensors Journal 2022年 第2期22卷 1638-1651页
作者: Zhang, Yigong Sun, Zezhou Wu, Banghe Yang, Jian Kong, Hui Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Laboratory of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China University of Macau Taipa China
In this work, a novel paradigm is proposed to build a hybrid RGB/FIR camera, which outputs pixel-wisely aligned and temporally synchronized RGB and FIR frames simultaneously. Compared with the existing schemes, we inn... 详细信息
来源: 评论
Evaluating the Performance to Detecting Topic Shift of Large Language Models: A Study  9
Evaluating the Performance to Detecting Topic Shift of Large...
收藏 引用
9th International Conference on Intelligent Computing and Signal Processing, ICSP 2024
作者: Tian, Pingfang Liu, Deting Department of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Institute of Scientific and Technical Information of China The Key Laboratory of the Rich Media Knowledge Organisation and Service of Digital Publishing Content Beijing100038 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan430065 China
Topic shift detection aims to identify whether there is a change in the current topic of conversation or if a change is needed. The study found previous work did not evaluate the performance of large language models l... 详细信息
来源: 评论
Pricing Policy for a Dynamic Spectrum Allocation Scheme with Batch Requests and Impatient Packets in Cognitive Radio Networks
收藏 引用
Journal of systems science and systems Engineering 2022年 第2期31卷 133-149页
作者: Haixing Wu Shunfu Jin Wuyi Yue School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan UniversityQinhuangdao 066004China Department of Intelligence and Informatics Konan UniversityKobe 658-8501Japan
In cognitive radio networks(CRNs),multiple secondary users may send out requests simultaneously and one secondary user may send out multiple requests at one time,i.e.,request arrivals usually show an aggregate ***,a s... 详细信息
来源: 评论
Secure speaker identification in open and closed environments modeled with symmetric comb filters
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 19147-19189页
作者: Shafik, Amira Monir, Mohamad El-Shafai, Walid Khalaf, Ashraf A. M. Nassar, M.M. El-Fishawy, Adel S. El-Din, M. A. Zein Dessouky, Moawad I. El-Rabaie, El-Sayed M. Abd El-Samie, Fathi E. Department Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Laboratory Department of Computer Science Prince Sultan University Riyadh11586 Saudi Arabia Electrical Engineering Department Faculty of Engineering Minia University Minia61519 Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication systems, forensic investigation, and personal voice assistance. Howe... 详细信息
来源: 评论
Computing Challenges of UAV Networks: A Comprehensive Survey
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 1999-2051页
作者: Altaf Hussain Shuaiyong Li Tariq Hussain Xianxuan Lin Farman Ali Ahmad Ali AlZubi School of Computer Science&Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Industrial Internet of Things and Networked Control Ministry of EducationChongqing University of Posts and TelecommunicationsChongqing400065China School of Computer Science and Technology Zhejiang Gongshang UniversityHangzhou310018China School of Artificial Intelligence Nanjing University of Information Science&TechnologyNanjing210044China Department of Computer Science and Engineering School of ConvergenceCollege of Computing and InformaticsSungkyunkwan UniversitySeoul03063Republic of Korea Department of Computer Science Community CollegeKing Saud UniversityRiyadh11495Saudi Arabia
Devices and networks constantly upgrade,leading to rapid technological ***-dimensional(3D)point cloud transmission plays a crucial role in aerial computing terminology,facilitating information *** network types,includ... 详细信息
来源: 评论
Power amplifier circuit defect detection based on improved Patch SVDD
Power amplifier circuit defect detection based on improved P...
收藏 引用
作者: Xie, Zhonghui Kong, Wa Zhou, Xinyu Zhang, Wence Zhong, Yujie Xia, Jing School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang China Department of Electronic Information Engineering Hong Kong Polytechnic University Hong Kong
In the manufacturing process of power amplifier (PA), various defects on the circuit surface will seriously affect the circuit performance and its operation. To solve the above problems, this article proposes a circui... 详细信息
来源: 评论
Test Suite Generation Based on Context-Adapted Structural Coverage for Testing DNN
Test Suite Generation Based on Context-Adapted Structural Co...
收藏 引用
Asia-Pacific Network Operations and Management Symposium (APNOMS)
作者: Wei Kong Qianjin Du Huayang Cao Hu Li Tong Wang Jianwen Tian Xiaohui Kuang National Key Laboratory of Science and Technology on Information System Security Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Deep learning (DL) introduces a novel data-driven programming paradigm, where the system logic is constructed through data training. However, this approach poses challenges in terms of system analysis and defect detec...
来源: 评论
Physically Secure and Privacy-Preserving Authentication Scheme for VANET
Physically Secure and Privacy-Preserving Authentication Sche...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and systems, AIoTSys 2024
作者: Chen, Dongmei Liang, Yangfan Li, Lihui Liu, Yining School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Jiaxing University Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems Jiaxing China School of Data Science and Artificial Intelligence Wenzhou University of Technology Wenzhou China
The communication between vehicles and other entities occurs over open wireless networks, making them susceptible to various security attacks In Vehicular Ad Hoc Network (VANET). Consequently, many researchers have pr... 详细信息
来源: 评论